Deepak Singh Tomar

824 total citations
69 papers, 394 citations indexed

About

Deepak Singh Tomar is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Deepak Singh Tomar has authored 69 papers receiving a total of 394 indexed citations (citations by other indexed papers that have themselves been cited), including 32 papers in Information Systems, 31 papers in Computer Networks and Communications and 27 papers in Signal Processing. Recurrent topics in Deepak Singh Tomar's work include Advanced Malware Detection Techniques (27 papers), Network Security and Intrusion Detection (16 papers) and Digital and Cyber Forensics (7 papers). Deepak Singh Tomar is often cited by papers focused on Advanced Malware Detection Techniques (27 papers), Network Security and Intrusion Detection (16 papers) and Digital and Cyber Forensics (7 papers). Deepak Singh Tomar collaborates with scholars based in India, China and Saudi Arabia. Deepak Singh Tomar's co-authors include Nikhil Singh, Arun Kumar Sangaiah, R. K. Pateriya, Sulekh Chandra, Gaurav Soni, C. K. Jha, Amit Kumar, Amit Sinhal, K.V.S. Hari Kumar and Vijay Bhaskar Semwal and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Computers & Security.

In The Last Decade

Deepak Singh Tomar

58 papers receiving 358 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Deepak Singh Tomar India 11 159 143 132 95 55 69 394
Ke Ji China 13 233 1.5× 215 1.5× 106 0.8× 101 1.1× 61 1.1× 49 502
Ian Oliver Finland 11 149 0.9× 170 1.2× 184 1.4× 59 0.6× 67 1.2× 63 436
Jianhai Chen China 13 404 2.5× 177 1.2× 288 2.2× 65 0.7× 45 0.8× 36 545
Wei‐Guang Teng Taiwan 9 152 1.0× 89 0.6× 108 0.8× 38 0.4× 88 1.6× 30 330
Francesco Santini Italy 11 175 1.1× 277 1.9× 112 0.8× 43 0.5× 35 0.6× 74 417
Zhong Chen China 11 457 2.9× 222 1.6× 164 1.2× 112 1.2× 32 0.6× 43 559
Junho Shim South Korea 12 225 1.4× 156 1.1× 378 2.9× 92 1.0× 62 1.1× 45 600
Esko Nuutila Finland 8 73 0.5× 132 0.9× 116 0.9× 59 0.6× 35 0.6× 20 330
Trong Duc Le South Korea 8 191 1.2× 103 0.7× 146 1.1× 18 0.2× 70 1.3× 15 394
Arthur Sandor Voundi Koe China 11 179 1.1× 190 1.3× 83 0.6× 22 0.2× 32 0.6× 26 330

Countries citing papers authored by Deepak Singh Tomar

Since Specialization
Citations

This map shows the geographic impact of Deepak Singh Tomar's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Deepak Singh Tomar with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Deepak Singh Tomar more than expected).

Fields of papers citing papers by Deepak Singh Tomar

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Deepak Singh Tomar. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Deepak Singh Tomar. The network helps show where Deepak Singh Tomar may publish in the future.

Co-authorship network of co-authors of Deepak Singh Tomar

This figure shows the co-authorship network connecting the top 25 collaborators of Deepak Singh Tomar. A scholar is included among the top collaborators of Deepak Singh Tomar based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Deepak Singh Tomar. Deepak Singh Tomar is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Tomar, Deepak Singh, et al.. (2025). MOSDroid: Obfuscation-resilient android malware detection using multisets of encoded opcode sequences. Computers & Security. 152. 104379–104379. 3 indexed citations
3.
Shekhar, Raj, et al.. (2024). Human Activity Recognition Using Deep Learning Techniques for Healthcare Applications. 1–6. 1 indexed citations
4.
Tomar, Deepak Singh, et al.. (2024). Integrating CNN and XGBoost with Synthetic Samples for Advanced Android Malware Detection. 1–6. 1 indexed citations
5.
Tomar, Deepak Singh, et al.. (2024). Synthesis, Characterization, Theoretical Studies and BSA Binding Of Co(II), Ni(II) and Cu(II) Schiff Base Complexes. Iranian Journal of Science. 48(5). 1161–1174. 2 indexed citations
6.
Pateriya, R. K., et al.. (2024). Design of an Iterative Method for Malware Detection Using Autoencoders and Hybrid Machine Learning Models. IEEE Access. 12. 175032–175055. 2 indexed citations
8.
Tomar, Deepak Singh, et al.. (2023). Transformer based multimodal similarity search method for E-Commerce platforms. 15. 1–6. 1 indexed citations
9.
Tomar, Deepak Singh, et al.. (2023). Secure the ownership of WoT devices using secure ownership transfer framework. International Journal of Information Technology. 15(4). 2161–2171. 1 indexed citations
10.
Khare, Nilay, et al.. (2022). Machine Learning, Image Processing, Network Security and Data Sciences. Communications in computer and information science.
11.
Khare, Nilay, et al.. (2022). Machine Learning, Image Processing, Network Security and Data Sciences. Communications in computer and information science. 5 indexed citations
12.
Tomar, Deepak Singh, et al.. (2021). Analysis of malware by integrating API extracted from dynamic and memory analysis. 6(2). 93–93.
13.
Jha, C. K., et al.. (2020). A Framework for Web Application Vulnerability Detection. International Journal of Engineering and Advanced Technology. 9(3). 543–549. 3 indexed citations
14.
Tomar, Deepak Singh, et al.. (2020). Block Chain Based Authorization and Access Control Mechanisms for IoT Environments: Challenges and Opportunities. International Journal of Innovative Technology and Exploring Engineering. 9(12). 237–245. 1 indexed citations
15.
Tomar, Deepak Singh, et al.. (2019). WoT-UAF: User Authorization Framework of the Web of Things. International Journal of Innovative Technology and Exploring Engineering. 8(11S). 606–612. 1 indexed citations
16.
Tomar, Deepak Singh, et al.. (2019). A Lightweight Authentication Method in Perception Layer of IoT Through Digital Watermarking. International Journal of Recent Technology and Engineering (IJRTE). 8(3). 2937–2942.
17.
Tomar, Deepak Singh, et al.. (2015). DNS Pharming through PHP Injection: Attack Scenario and Investigation. International Journal of Computer Network and Information Security. 7(4). 21–28. 4 indexed citations
18.
Kumar, K.V.S. Hari, et al.. (2014). Acrocyanosis with intrahepatic carcinoid tumor. Indian Dermatology Online Journal. 5(2). 221–221. 2 indexed citations
19.
Tomar, Deepak Singh, et al.. (2012). An Approach To Perceive Tabnabbing Attack. International journal of scientific and technology research. 1(6). 90–94. 13 indexed citations
20.
Jain, Saurabh, et al.. (2012). Detection of Javascript Vulnerability At Client Agent. International journal of scientific and technology research. 1(7). 36–41. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026